-
341
Conditional Proxy Re-Encryption-Based Key Sharing Mechanism for Clustered Federated Learning
Published 2024-02-01“…By combining the functions of the bilinear pairwise accumulator and specific conditional proxy broadcast re-ciphering, the mechanism can verify the integrity of homomorphic encryption keys stored on cloud servers. In addition, the solution enables key management centers to grant secure and controlled access to re-encrypted homomorphic encryption keys to third parties without disclosing the sensitive information contained therein. …”
Get full text
Article -
342
-
343
StealthyCRM, a secure Cloud CRM system application that supports fully homomorphic database encryption
Published 2015“…To provide a practical and secure solution to these enterprises, this project aims to build a cloud CRM system that enables fully homomorphic encryption. In order to explore the potential of this, the project integrats three key components: Open source CRM system SugarCRM, partial homomorphic database system CryptDB and fully homomorphic encryption library HElib. …”
Get full text
Final Year Project (FYP) -
344
Privacy‐preserving evaluation for support vector clustering
Published 2021-01-01“…Abstract The authors proposed a privacy‐preserving evaluation algorithm for support vector clustering with a fully homomorphic encryption. The proposed method assigns clustering labels to encrypted test data with an encrypted support function. …”
Get full text
Article -
345
Fast Proxy Re-Encryption for Publish/Subscribe Systems
Published 2021“…Our first scheme (which we call NTRU-ABD-PRE) is based on a variant of the NTRU-RLWE homomorphic encryption scheme. Our second and main PRE scheme (which we call BV-PRE) is built on top of the Brakerski-Vaikuntanathan (BV) homomorphic encryption scheme and relies solely on the RLWE assumption. …”
Get full text
Article -
346
TAPAS: Tricks to Accelerate (encrypted) Prediction As a Service
Published 2018“…The one drawback of using fully homomorphic encryption is the amount of time required to evaluate large machine learning models on encrypted data. …”
Conference item -
347
On the IND-CCA1 Security of FHE Schemes
Published 2022-03-01“…Fully homomorphic encryption (FHE) is a powerful tool in cryptography that allows one to perform arbitrary computations on encrypted material without having to decrypt it first. …”
Get full text
Article -
348
Federify: A Verifiable Federated Learning Scheme Based on zkSNARKs and Blockchain
Published 2024-01-01“…We propose Federify, a decentralized federated learning framework based on blockchain that employs homomorphic encryption and zero knowledge proofs to provide security, privacy, and transparency. …”
Get full text
Article -
349
A Randomized Watermarking Technique for Detecting Malicious Data Injection Attacks in Heterogeneous Wireless Sensor Networks for Internet of Things Applications
Published 2018-12-01“…The scheme uses homomorphic encryption techniques to conceal the report’s measurement from any adversary. …”
Get full text
Article -
350
Secure Two-Party Decision Tree Classification Based on Function Secret Sharing
Published 2023-01-01“…The critical techniques employed include homomorphic encryption, function secret sharing (FSS), and a custom secure comparison protocol. …”
Get full text
Article -
351
Development of a framework to encrypt plaintext to ciphertext
Published 2021“…The Fully Homomorphic Encryption scheme is an evolvement from the Brakerski- Gentry-Vaikuntanathan (BGV) scheme. …”
Get full text
Final Year Project (FYP) -
352
ПРИМЕНЕНИЕ ЗАПУТЫВАЮЩИХ ПРЕОБРАЗОВАНИЙ В КРИПТОГРАФИИ
Published 2009-06-01“…This paper covers questions related with transforming symmetric encryption schemes into asymmetric and designing homomorphic encryption schemes.…”
Get full text
Article -
353
Research on medical data storage and sharing model based on blockchain
Published 2023-09-01“…To solve the above problems, a secure storage and sharing model of private data based on blockchain technology and homomorphic encryption is constructed. Based on the idea of blockchain decentralization, the model maintains a reliable medical alliance chain system to ensure the safe transmission of data between different institutions; A privacy data encryption and computing protocol based on homomorphic encryption is constructed to ensure the safe transmission of medical data; Using its complete anonymity to ensure the Blockchain of medical data and patient identity privacy; A strict transaction control management mechanism of medical data based on Intelligent contract automatic execution of preset instructions is proposed. …”
Get full text
Article -
354
Blockchain Based M+1st-Price Auction With Exponential Bid Upper Bound
Published 2023-01-01“…However, previous protocols that use binary format bidding vectors require a somewhat homomorphic encryption (SHE) and a trusted manager. To make sure no party except the bidder itself knows its bid, our protocol does not have any managers. …”
Get full text
Article -
355
SHIELD: Scalable Homomorphic Implementation of Encrypted Data-Classifiers
Published 2017“…Homomorphic encryption (HE) systems enable computations on encrypted data, without decrypting and without knowledge of the secret key. …”
Get full text
Get full text
Article -
356
-
357
Feature Fusion Methods for Indexing and Retrieval of Biometric Data: Application to Face Recognition With Privacy Protection
Published 2021-01-01“…Furthermore, by facilitating a seamless integration of template protection with open-source homomorphic encryption libraries, the proposed method guarantees unlinkability, irreversibility, and renewability of the protected biometric data.…”
Get full text
Article -
358
Let’s stride blindfolded in a forest : sublinear multi-client decision trees evaluation
Published 2021“…(ESORICS ’17) propose a privacy-preserving decision-tree evaluation protocol purely based on additive homomorphic encryption, without introducing dummy nodes for hiding the tree structure, but it runs a secure comparison for each decision node, resulting in linear complexity. …”
Get full text
Conference Paper -
359
Secure human action recognition by encrypted neural network inference
Published 2022-08-01“…In this paper, the authors propose a strategy that uses homomorphic encryption, which guarantees information confidentiality while retaining action detection.…”
Get full text
Article -
360
Privacy-preserving protocols from lattice cryptography
Published 2019“…In the first scenario, we use fully homomorphic encryption for finite extension fields and design a wildcard pattern matching algorithm on encrypted strings and patterns. …”
Get full text
Get full text
Thesis